- The more valuable information is the higher the threats and chances for an attack are.
- 📝 Threat means anything that has potential of causing damage to the system.
- Network is the set of devices that are connected through communication channels where data exchange happens between devices
- Attacker may break into the channel and steal the information that is being exchanged.
- E.g. • denial of service attacks (DoS) • password-based attacks • compromised-key attacks, firewall and IDS attacks • DNS and ARP poisoning • man in the middle (MITM) attack • spoofing • session hijacking • information gathering • sniffing...
- Attack that tries to gain access to information from a system
- E.g. • password attacks • unauthorized access • profiling • malware attacks • footprinting • denial of service attacks (DoS) • arbitrary code execution • privilege escalation • backdoor attacks • physical security threats
- Exploitation of vulnerabilities that exists in the application itself
- Caused by e.g. bad coding practices
- Rushed programs has mistakes e.g. lack of validation of input data
- Can be found through reverse engineering, or trial and error
- Large codes that are difficult to maintain has more vulnerabilities.
- Mostly because of improper input validation.
- E.g. • SQL injection • cross-site scripting • session hijacking • identity spoofing • improper input validation • security misconfiguration • information disclosure • hidden-field manipulation • broken session management • cryptography attacks • buffer overflow attacks • phishing
- Or cyber attack
- Attempt to gain unauthorized access to a system or network.
- Actualization of a threat
- Attack = Motive + Vulnerability + Method (exploit)
- General core of every motives is access to the valuable information
- Common motives:
- Interrupting the flow of business activities and processes
- Stealing valuable information
- Data manipulation
- Stealing money and important financial information
- Revenge
- Ransom
- You need to find vulnerability in a system to have an attack
- You can never prove that's its not vulnerable, but can prove it's vulnerable.
- or You can never prove that a system is secure, but can prove it's insecure.
- ❗ If OS is taken over protecting applications won't matter.
- Vulnerabilities include
- Bugs (as it's a big codebase)
- Buffer overflow
- Unpatched operating systems (can lead to e.g. zero day vulnerabilities)
- Attacks include
- Exploiting network protocol implementations
- Authentication attacks
- Cracking passwords
- Breaking filesystem security
- 💡 Secure OS is an OS that's updated, monitored, regulated as frequently as possible.
- See also banner grabbing
- Hacker gains access to the system that has poorly configured security.
- Can affect works, databases, web servers, etc.
- E.g. • using default accounts (passwords) • forgetting Apache server online to allow proxy requests enabling DDoS attacks
- 💡 Detected mostly by automated scanners
- Similar to OS attacks but far less damaging as their scope is far narrower.
- Caused by lack of testing as developers rush development of applications and miss something.
- E.g. • sensitive information disclosure • buffer overflow attack • SQL injection v cross-site scripting • session hijacking denial of service • man in the middle • phishing
- 🤗 E.g. Transmission torrent client (macOS)
- The store where it was downloaded was compromised
- They substituted torrent download link to their own application
- See Transmission is hacked to spread malware
- Attacks on libraries and frameworks that the software is depended on.
- Finding vulnerabilities in libraries allows re-using same exploits on more than single application
- 💡 Use libraries: older, more mature, maintained, updated actively with proven track record.
- E.g.
- A bug is fixed in library but application uses older version.
- Application uses libraries in debug mode or with default configurations.
- Attack vector = Means by which hackers deliver a payload to systems and networks
- Cloud computing threats such as data breach and loss.
- IoT threats usually caused by insecure devices and hardware constraints (battery, memory, CPU etc.)
- Ransomware: Restricts access to your files and requires payment to be granted access
- Mobile threats
- 📝 Stealthy threat actor with continuous attacks targeting a specific entity.
- APT groups include:
- Advanced
- Uses special malware, often crafted for specific organizations
- Usually a modified version of common malware used in botnets
- Sophisticated techniques against target not generic
- Uses special malware, often crafted for specific organizations
- Persistent
- Long-term presence with external command and control
- Extracting data
- Usually low-and-slow to avoid detection
- E.g. instead of sending big data, it breaks data to chunks and sends each chunk whenever a user is connected to the internet
- Threat
- Targets high value organizations and information
- E.g. governments and big companies
- 🤗 E.g.
- Sony Pictures hack where sensitive data from Sony, e.g. unreleased movies was published as torrents.
- 2020 United States federal government data breach where more than 18.000 US companies and government agencies where hacked.
- Common steps
- Create a breach e.g. through spear phishing
- Exploit inner system vulnerabilities
- Control of the system or its segments
- Data exfiltration (= unauthorized data transfer)
- Both can replicates themselves throughout the system in files, documents.
- Have capabilities to infect systems and networks in a quick time.
- Virus: Requires user action to be activated e.g. running a file that has a virus embedded.
- Worm: can spread independently without any user action i.e. self-replicating
- 📝 Used by hackers to control the infected machines e.g. phones, PC, IoT
- Hackers perform malicious activities from the machines on which bots run eg. DDoS attacks.
- Main problem is lack of security software or proper updates on devices.
- See also Botnet trojans and Botnets | Denial of Service
- Performed by a person from within the organization who has authorized access.
- E.g. disgruntled employee, employee paid by a third-party
- Presents one of the greatest potential of risk and most difficult attacks to defend against.
- See also Insider attacks | Social engineering types.
- Pure insider
- Inside employee with normal access rights
- Elevated pure insider
- Insider with elevated access
- Insider associate
- Insider with limited authorized access (e.g. guard, cleaning person)
- Insider affiliate
- Spouse, friend, or client of an employee that uses employee's credentials.
- Outsider affiliate
- Unknown and untrusted person from outside the organization.
- Uses an open access channel or stolen credentials to gain unauthorized access.
- Restricting access
- Logging to know who access what at what point of time
- Active monitoring of employees with elevated privileges
- Trying to not have disgruntled employees
- Separation of duties
- Also known as segregation of duties
- Concept of having more than one person required to complete a task.
- See also Separation of duties | Cloud computing
- Takes advantage of poorly written code and lack of proper validation of input and output data.
- E.g. buffer overflows, SQL injections, cross-site scripting
- 💡 There are many online scanning tools to detect those.
- Use of information and communication technologies for competitive advantages over an opponent
- Weapons include • viruses • worms • trojan horses • logic bombs • trap doors • nano machines and microbes • electronic jamming • penetration exploits and tools.
- E.g.
- Corporations spy on each other to use each others technology secrets and patents
- 🤗 Also known as Industrial espionage
- Governments spy on other governments by using hackers as proxies to gain information about e.g. defense systems.
- Intellectual property thefts with reverse engineering to create products without investing in R&D
- Corporations spy on each other to use each others technology secrets and patents
- Categories include:
- Command and control (C2) warfare
- Taking down the command center may protect the headquarters but may interfere with their mobility
- Intelligence-based warfare
- Sensor-based technology to disrupt systems
- Electronic warfare
- Enhance, degrade, or intercept the flow of information
- Psychological warfare
- "Capture their minds and their hearts and souls will follow"
- E.g. propaganda or terror
- Hacker warfare
- Acquire information about subject A, sell it to subject B.
- Economic information warfare
- Channeling or blocking information to pursue economic dominance
- Cyber warfare: use of information systems against virtual personas
- Command and control (C2) warfare
- Each category can have:
- Offensive strategy
- Attacks against an opponent
- E.g. web application attacks, malware attacks, system hacking..
- Defensive strategy
- Actions taken against attacks.
- E.g. monitoring, alerts, response, detection, prevention systems
- Offensive strategy
- See also Information Warfare website